Tìm hiểu các loại VPN phổ biến

Encrypt Your Data

VPN is a superior type of internet connection that assists keep hacker eyes far from your identity and secure data. As a whole, it is using a technology which is called encryption.

Encryption is the method to encode your data when you send and decode your data when server or another person receive. Because if hacker try to steal your data or packet, it is useless for them without knowing the decryption key. Whereas all VPNs use this method but they all have used differed technology. There are several types of VPN protocols that you can use to secure your data.

Most Common VPN Protocols

When you registered on any VPN or you still using any VPN service, you have an access to use number of protocols. Now the time is to deeply know about the types of protocols.

1. PPTP (Point-to-Point Tunneling Protocol)

PPTP is one of the old fashion protocol but still worthy. The earliest design for PPTP was launched back in the early 90s. This sort of VPN protocol is just easily to set up and has nearly widespread support but it several cons you have to know about.

PPTP does not truly have a precise validation or encryption technology stated. Though, when PPTP is declared these days, it nearly indeed refers to the version that was developed by Microsoft. It systems a sets of technology notorious as the Windows PPTP heap and gives numerous opportunities in terms of encryption métier.

PPTP is extremely rapid in association to contemporary, heavy-duty encrypted protocols. This is a worthy when it derives into bandwidth-intensive uses for instance video streaming. The difficulty with PPTP is that its security processes have been dithering to scraps over the years. Several fresher protocols available because the susceptibilities in PPTP are very thoughtful. Though PPTP may retain the average script childish, it’s definitely within the influence of a government association or some other well-known individual to robbery and take what they need.

2. L2TP (Layer 2 Tunneling Protocol)

L2TP is related to PPTP because it is as well a tunneling protocol. Simply, it doesn’t have its personal integral encryption or other confidentiality technology. In its place, you may plug in distinctive to do that job which then amends the data packets earlier and later it come in and leaves the L2TP tunnel.

The most shared pairing with L2TP is a security protocol group also known as IPsec (Internet Protocol Security). It’s IPsec that really comprises the technology that controls the validation between your PC and the VPN server. IPsec moreover comprises the tools to encrypt your data with strongly-encryption method. This creates it just about difficult for any governments or any entity to decode into your encrypted data.

One of the highest level issues with L2TP is that it may be blocked pretty simply. When you live in that country where strictly prohibited to use of VPNs, discontinuing L2TP is easy. That is because it just uses a minor amount of network ports, all you must to do is shut them off, and your VPN discontinues.

3. SSTP (Secure Socket Tunneling Protocol)

SSTP is the VPN protocols which doesn’t agonize from the VPN blocking susceptibility we get with L2TP. Actually, there are numerous reasons to like SSTP which we will bother in a second. Though, you have to identify right off the bat that SSTP is primarily allied with Windows, so if you need to perform it on anything else, you may be unlucky. There is promising support for Mac OS and Linux but your distance may be different. If you suppose for a Windows-based VPN, then it’s valuable.

We initially saw SSTP with the launch of Windows Vista Service Pack 1. As you may have predicted, SSTP is a branded protocol solely owned and developed by Microsoft. That may be an issue for those people since the core workings of the customary are shut off. This means there is at all times a fortuitous that Microsoft could have constructed way out into their standard at the request of the US government. Typically, there’s no definite sign of this but you have to remember it rely on why you need VPN protection.

4. OpenVPN (Open Source VPN)

OpenVPN is an Open Source VPN protocol that is continuously upward and retain pace with the regularly developing world of cybersecurity. It uses OpenSSL and TLS as a core. There is, still, an entire horde of other trivial technologies put together into it I don’t have the planetary to drive into here. As other VPN protocols, OpenVPN has no instinctive support for any operating system or hardware. Thus, you may think of OpenVPN being a system-dubious way out. This is both pros and cons for OpenVPN meanwhile it means anybody who needs to use OpenVPN necessity utilize a third-party VPN client.

OpenVPN is extensively used by best VPN providers since these firms have the assets to grow their own VPN clients. This as well means the VPN provider ultimately controls what devices it supports. If it does not build a client for, for example, Android, then you can’t use it.

5. IKEv2 (Internet Key Exchange)

L2TP and IKEv2 is a grouping of different tunneling protocols collective with the IPsec group of security technologies. This is a new protocol that isn’t open in nature. O’er, Microsoft has already involved in it, but in this situation, they driven with networking hulk Cisco to get the technology standing by.

IKE is the latest protocols, released in the mid of 2000s and it hasn’t so far become broadly supported or putative. The newest version is IKEv2 and if you are in a corporate background that still trusts on Blackberry technology for security, you will affection this protocol. Blackberry systems have instinctive support for IKEv2.

Fortunately for everyone, it moreover supports other OS that are less mysterious. iOS, is a big example, has also support. Actually, IKEv2 was developed for mobile security and is proficient of allowing handsets shift from Wi-Fi connections to the data internet connection without falling the VPN tunnel.

Conclusion

Protocols are just a minor part of what to deliberate when picking a VPN. For your relaxation, we have shared an article of best VPN of 2019 which is based on real users review. So, now it’s easy to select what is best for your needs

HOW TO: PPTP: Ubuntu Client connect to Windows VPN Server

  1. $ apt-get install network-manager-pptp
  2. $ sudo /etc/init.d/network-manager restart
  3. Click the NetworkManager Applet
  4. VPN Connection -> Configure VPN -> -> Add
  5. Choose -> Create
  6. Fill out those neccessary informations and click Advanced
  7. In Authentication section, CANCEL , , and , KEEP ONLY and SELECTED.
  8. In Security and Compression section, SELECT , and choose Security to be
  9. OK -> Accept -> Close
  10. Now click the NetworkManager Applet
  11. Click VPN Connection and click the profile you just created.
  12. Wait for few seconds till it get connected.
  13. Done.

Source:

https://medium.com/geeky-log/howto-pptp-ubuntu-client-connect-to-windows-vpn-server-4062ecab2243

https://medium.com/@jennysang4/most-common-vpn-protocols-explained-eee7cd35e5e9